HEUR:Trojan.Win32.Generic (Kaspersky), LooksLike.Win32.Malware!B (v) (VIPRE), Email-Worm.Win32.LoveLetter!IK (Emsisoft), Virus.Win32.Duel.FD, GenericEmailWorm.YR, GenericIRCBot.YR (Lavasoft MAS)Behaviour: Trojan, Worm, Email-Worm, EmailWorm, Virus, IRCBot
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 2ee9b6385336b1dc1cc4a001439759cc
SHA1: 4422d3d19be101e669fa2950cd6b1f6e73d8c1b1
SHA256: 9f5f99ab27cb724cd674eb2536a08c09258e108297e392f4fa298ea7d2b405ef
SSDeep: 768:xqNqKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKA:gmqVEEYTK6QCi2
Size: 42496 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2005-05-15 10:13:28
Summary: Virus. A program that recursively replicates a possibly evolved copy of itself.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
EmailWorm | Worm can send e-mails. |
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Virus creates the following process(es):
yqyajqiaq.jjr:312
yqyajqiaq.jjr:3936
%original file name%.exe:1116
File activity
The process yqyajqiaq.jjr:312 makes changes in the file system.
The Virus creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\jyabiy.rrqq.qya (42496 bytes)
The process yqyajqiaq.jjr:3936 makes changes in the file system.
The Virus creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\rzrjza.zzzq.qya (42496 bytes)
The process %original file name%.exe:1116 makes changes in the file system.
The Virus creates and/or writes to the following file(s):
%Program Files%\Adobe\Reader 9.0\Reader\rzqyjaaar.iza (42496 bytes)
C:\Perl\bin\abrrararq.qjy (42496 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rajiji.jabq.qya (42496 bytes)
%Program Files%\Wireshark\rrrziiirr.qyr (42496 bytes)
%Program Files%\Wireshark\zbzbyqqjb.yjz (42496 bytes)
C:\Perl\bin\rrrziiirr.qyr (42496 bytes)
%Program Files%\Wireshark\abrrararq.qjy (42496 bytes)
%WinDir%\network diagnostic\yqyajqiaq.jjr (42496 bytes)
C:\Perl\bin\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Wireshark\rzqyjaaar.iza (42496 bytes)
%Program Files%\Wireshark\bijrazyiy.aib (42496 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\byjayayar.abr (42496 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\zbzbyqqjb.yjz (42496 bytes)
%WinDir%\ehome\iazzzarib.yqa (42496 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\byjayayar.abr (42496 bytes)
D:\zbzbyqqjb.yjz (42496 bytes)
%Program Files%\Common Files\Adobe\Updater6\rrrziiirr.qyr (42496 bytes)
%Program Files%\WinPcap\byjayayar.abrjz (42496 bytes)
%WinDir%\Installer\{350C9419-3D7C-4EE8-BAA9-00BCB3D54227}\bijrazyiy.aib (42496 bytes)
%WinDir%\xwrm.exe (42496 bytes)
%WinDir%\Microsoft.NET\Framework\rzqyjaaar.iza (42496 bytes)
%Program Files%\Messenger\zbzbyqqjb.yjzy (42496 bytes)
%Program Files%\Windows NT\abrrararq.qjy (42496 bytes)
C:\Perl\bin\rzqyjaaar.iza (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1049-7B44-A93000000001}\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Windows Media Player\byjayayar.abr (42496 bytes)
%Program Files%\Wireshark\iazzzarib.yqajayayar.abr (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\abrrararq.qjy (42496 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yaqrzr.zajst.wsc (43035 bytes)
C:\Perl\bin\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\iazzzarib.yqa (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\rrrziiirr.qyr (42496 bytes)
Registry activity
The process %original file name%.exe:1116 makes changes in the system registry.
The Virus creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E0 BD 5E 69 37 AC 16 B6 99 7E 1D 23 8C A1 75 81"
To automatically run itself each time Windows is booted, the Virus adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"x32x" = "%WinDir%\xwrm.exe"
Network activity (URLs)
No activity has been detected.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
yqyajqiaq.jjr:312
yqyajqiaq.jjr:3936
%original file name%.exe:1116 - Delete the original Virus file.
- Delete or disinfect the following files created/modified by the Virus:
%Documents and Settings%\%current user%\Local Settings\Temp\jyabiy.rrqq.qya (42496 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rzrjza.zzzq.qya (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\rzqyjaaar.iza (42496 bytes)
C:\Perl\bin\abrrararq.qjy (42496 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\rajiji.jabq.qya (42496 bytes)
%Program Files%\Wireshark\rrrziiirr.qyr (42496 bytes)
%Program Files%\Wireshark\zbzbyqqjb.yjz (42496 bytes)
C:\Perl\bin\rrrziiirr.qyr (42496 bytes)
%Program Files%\Wireshark\abrrararq.qjy (42496 bytes)
%WinDir%\network diagnostic\yqyajqiaq.jjr (42496 bytes)
C:\Perl\bin\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Wireshark\rzqyjaaar.iza (42496 bytes)
%Program Files%\Wireshark\bijrazyiy.aib (42496 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\byjayayar.abr (42496 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\zbzbyqqjb.yjz (42496 bytes)
%WinDir%\ehome\iazzzarib.yqa (42496 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\byjayayar.abr (42496 bytes)
D:\zbzbyqqjb.yjz (42496 bytes)
%Program Files%\Common Files\Adobe\Updater6\rrrziiirr.qyr (42496 bytes)
%Program Files%\WinPcap\byjayayar.abrjz (42496 bytes)
%WinDir%\Installer\{350C9419-3D7C-4EE8-BAA9-00BCB3D54227}\bijrazyiy.aib (42496 bytes)
%WinDir%\xwrm.exe (42496 bytes)
%WinDir%\Microsoft.NET\Framework\rzqyjaaar.iza (42496 bytes)
%Program Files%\Messenger\zbzbyqqjb.yjzy (42496 bytes)
%Program Files%\Windows NT\abrrararq.qjy (42496 bytes)
C:\Perl\bin\rzqyjaaar.iza (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1049-7B44-A93000000001}\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Windows Media Player\byjayayar.abr (42496 bytes)
%Program Files%\Wireshark\iazzzarib.yqajayayar.abr (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\abrrararq.qjy (42496 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\yaqrzr.zajst.wsc (43035 bytes)
C:\Perl\bin\yqyajqiaq.jjr (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\iazzzarib.yqa (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\bijrazyiy.aib (42496 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\rrrziiirr.qyr (42496 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"x32x" = "%WinDir%\xwrm.exe"